Data Loss Prevention White Papers

Results 1 - 25 of 266Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Feb 06, 2018

Read the white paper to learn how you can address key GDPR requirements by consolidating all your data in a central repository to gain tighter security and control, easier access and retrieval.

Tags : opentext, gdpr compliance, eu privacy, data protection, data access, compliance, network security, remote access, access control, policy based management, security policies, best practices, international computing, business technology, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.

Tags : gdpr, data protection, rsa, rsa security, personal data, privacy, compliance, security policies, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.

Tags : rsa, rsa security, gdpr, data protection, compliance, network security, internet security, intrusion detection, best practices, business technology, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security, business technology, data loss prevention
    
By: Thales     Published Date: Jul 13, 2017

Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.

Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices, records management, data loss prevention
    
By: Workday     Published Date: Jun 05, 2017

In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.

Tags : workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology, finance technology, mobile data systems, smart phones, workforce management, data protection, collaboration, payroll software, financial management, expense management, technology, finance, data loss prevention
    
By: Grey Matter     Published Date: Jan 13, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam, application security, internet security, security management, virtualization, data loss prevention
    
By: Secureworks     Published Date: Nov 11, 2016

This paper sets out five major areas of focus for the practical CISO.

Tags : managed security services, ciso, security, risk management, security, threat and vulnerability management, vulnerability management, data loss prevention
    
By: Secureworks     Published Date: Nov 11, 2016

This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

Tags : managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection, vulnerability management, data loss prevention
    
By: Kaspersky     Published Date: Oct 26, 2016

Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.

Tags : kaspersky, hospital records, healthcare security, secure data, cybercrime, hacker detection, intrusion detection, intrusion prevention, data protection, records management, data loss prevention
    
By: Lenovo     Published Date: Oct 14, 2016

IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.

Tags : security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management, data loss prevention
    
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016

This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.

Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication, identity management, password management, wireless security, data protection, records management, data loss prevention
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection, mobile device management, data loss prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention, wireless security, server virtualization, data loss prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?

Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones, wireless messaging, wireless security, data protection, collaboration, messaging, data loss prevention
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware, anti virus, application security, encryption, internet security, intrusion detection, intrusion prevention, security management, data loss prevention
    
By: HPE     Published Date: Jun 06, 2016

This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.

Tags : data, data recovery, data backup, midsized business, disaster recovery, data protection, database security, infrastructure, data loss prevention
    
By: Riverbed     Published Date: May 19, 2016

Data protection, application performance, and business continuity are essential to staying competitive and profitable.

Tags : data, data protection, data centre, security, data security, application security, disaster recovery, security management, security policies, database development, database security, data loss prevention
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment, business technology, data loss prevention
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management, data loss prevention
    
By: Code42     Published Date: Apr 22, 2016

Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.

Tags : endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection, database security, data loss prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control, anti spam, anti spyware, application security, internet security, intrusion detection, intrusion prevention, security management, security policies, data loss prevention
    
By: IBM     Published Date: Apr 04, 2016

What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.

Tags : ibm, data breach, global, ponemon institute, knowledge management, enterprise applications, network security, data loss prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.